{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T10:06:18Z","timestamp":1775815578526,"version":"3.50.1"},"reference-count":52,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Key R&amp;D Program of Zhejiang","award":["2024C01025"],"award-info":[{"award-number":["2024C01025"]}]},{"name":"Key R&amp;D Program of Zhejiang","award":["2022C01018"],"award-info":[{"award-number":["2022C01018"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62103374"],"award-info":[{"award-number":["62103374"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U21B2001"],"award-info":[{"award-number":["U21B2001"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Technology Research and Development Program Project of Hangzhou","award":["2024SZD1A23"],"award-info":[{"award-number":["2024SZD1A23"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Sci. Eng."],"published-print":{"date-parts":[[2025,3]]},"DOI":"10.1109\/tnse.2025.3528831","type":"journal-article","created":{"date-parts":[[2025,1,15]],"date-time":"2025-01-15T20:11:53Z","timestamp":1736971913000},"page":"1357-1368","source":"Crossref","is-referenced-by-count":8,"title":["Label-Flipping Attacks in GNN-Based Federated Learning"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5170-8082","authenticated-orcid":false,"given":"Shanqing","family":"Yu","sequence":"first","affiliation":[{"name":"Institute of Cyberspace Security, College of Information Engineering, Zhejiang University of Technology, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-9986-1457","authenticated-orcid":false,"given":"Jie","family":"Shen","sequence":"additional","affiliation":[{"name":"Institute of Cyberspace Security, College of Information Engineering, Zhejiang University of Technology, Hangzhou, China"}]},{"given":"Shaocong","family":"Xu","sequence":"additional","affiliation":[{"name":"Institute of Cyberspace Security, College of Information Engineering, Zhejiang University of Technology, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9348-3424","authenticated-orcid":false,"given":"Jinhuan","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute of Cyberspace Security, College of Information Engineering, Zhejiang University of Technology, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7863-1070","authenticated-orcid":false,"given":"Zeyu","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute of Cyberspace Security, College of Information Engineering, Zhejiang University of Technology, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1042-470X","authenticated-orcid":false,"given":"Qi","family":"Xuan","sequence":"additional","affiliation":[{"name":"Institute of Cyberspace Security, College of Information Engineering, Zhejiang University of Technology, Hangzhou, China"}]}],"member":"263","reference":[{"key":"ref1","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. Artif. Intell. Statist.","author":"McMahan","year":"2017"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3298981"},{"key":"ref3","article-title":"Semi-supervised classification with graph convolutional networks","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Kipf","year":"2017"},{"key":"ref4","first-page":"5","article-title":"Federated learning: Strategies for improving communication efficiency","volume-title":"Proc. 29th Conf. Neural Inf. Process. Syst.","author":"Koneny","year":"2016"},{"key":"ref5","first-page":"2938","article-title":"How to backdoor federated learning","volume-title":"Proc. Int. Conf. Artif. Intell. Statist.","author":"Bagdasaryan","year":"2020"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/tnnls.2024.3360429"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2024.128166"},{"key":"ref8","article-title":"Adversarial attacks on graph neural networks via meta learning","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Zgner","year":"2019"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380149"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2023.11.019"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2022.3185785"},{"key":"ref12","first-page":"165","article-title":"FedGNN: Federated graph neural network for privacy-preserving recommendation","volume-title":"Proc. FL-ICML","author":"Wu","year":"2021"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539119"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2020.2975749"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.aiopen.2021.01.001"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-7913-1_8"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i6.20643"},{"key":"ref18","first-page":"18839","article-title":"Federated graph classification over non-IID graphs","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"34","author":"Xie","year":"2021"},{"key":"ref19","article-title":"FedGraphNN: A federated learning system and benchmark for graph neural networks","volume-title":"Proc. ICLR Workshop Distrib. Private Mach. Learn.,","author":"He","year":"2021"},{"key":"ref20","first-page":"374","article-title":"Towards federated learning at scale: System design","volume":"1","author":"Bonawitz","year":"2019","journal-title":"Proc. Mach. Learn. Syst."},{"key":"ref21","article-title":"Federated learning for mobile keyboard prediction","author":"Hard","year":"2018"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3075203"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220078"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5741"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3132919"},{"key":"ref26","article-title":"Fast gradient attack on network embedding","author":"Chen","year":"2018"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/669"},{"key":"ref28","article-title":"Attacking graph convolutional networks via rewiring","author":"Ma","year":"2019"},{"key":"ref29","first-page":"1115","article-title":"Adversarial attack on graph structured data","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Dai","year":"2018"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2019.2957786"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2023.3342901"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3362147"},{"key":"ref33","first-page":"634","article-title":"Analyzing federated learning through an adversarial lens","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Bhagoji","year":"2019"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2022.3161016"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2805680"},{"key":"ref36","article-title":"Mitigating backdoor attacks in federated learning","author":"Wu","year":"2020"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00397"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1002\/int.22902"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-020-02086-4"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/551"},{"key":"ref41","first-page":"9780","article-title":"A unified framework for data poisoning attack to graph-based semi-supervised learning","volume-title":"Proc. 33rd Int. Conf. Neural Inf. Process. Syst.","author":"Liu","year":"2019"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140451"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2956591"},{"key":"ref44","article-title":"Federated learning with non-iid data","author":"Zhao","year":"2018"},{"key":"ref45","article-title":"Pitfalls of graph neural network evaluation","author":"Shchur","year":"2018"},{"key":"ref46","first-page":"6861","article-title":"Simplifying graph convolutional networks","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Wu","year":"2019"},{"key":"ref47","article-title":"Graph attention networks","author":"Velikovi","year":"2018","journal-title":"Proc. Int. Conf. Learn. Representations"},{"key":"ref48","first-page":"870","article-title":"Adversarial label flips attack on support vector machines","volume-title":"Proc. ECAI","author":"Xiao","year":"2012"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i10.17118"},{"key":"ref50","article-title":"Bounding the expected robustness of graph neural networks subject to node feature attacks","author":"Abbahaddou","year":"2024","journal-title":"Proc. Int. Conf. Learn. Representations"},{"key":"ref51","article-title":"Mitigating sybils in federated learning poisoning","author":"Fung","year":"2018"},{"key":"ref52","article-title":"Can you really backdoor federated learning?","author":"Sun","year":"2019"}],"container-title":["IEEE Transactions on Network Science and Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488902\/10899093\/10839587.pdf?arnumber=10839587","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T05:54:25Z","timestamp":1740203665000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10839587\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3]]},"references-count":52,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tnse.2025.3528831","relation":{},"ISSN":["2327-4697","2334-329X"],"issn-type":[{"value":"2327-4697","type":"electronic"},{"value":"2334-329X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3]]}}}